SLR-CK – 11 *SLRCK11* M.Sc. – I (Semester – II) Examination, 2014

advertisement
SLR-CK – 11
*SLRCK11*
Seat
No.
M.Sc. – I (Semester – II) Examination, 2014
COMPUTER SCIENCE
UML (Paper – VII)
Day and Date : Thursday, 20-11-2014
Total Marks : 70
Time : 11.00 a.m. to 2.00 p.m.
Instructions : I) Question No. 1 and 2 are compulsory.
II) Attempt any three questions from Q. No. 3 to Q. No. 7.
III) Figures to the right side indicate full marks.
1. A) Choose the correct alternatives :
10
1) The UML is a language for ___________ the artifacts of a softwareintensive system.
a) Visualizing
b) Documenting
c) Both a) and b)
d) None of the above
2) Structural things are the ___________ of UML models.
a) Nouns
b) Syntax
c) Pronouns
d) Verbs
3) Certain elements are hidden to simplify the view is known as __________
a) Elided
b) Incomplete
c) Execution
d) Integrity
4) The __________ of a system encompasses the classes, interfaces, and
collaborations that form the vocabulary of the problem and its solution.
a) Design view
b) Process view
c) Use case view
d) Implementation view
5) Class diagrams are grouped under ___________
a) Structural modeling
b) Behavioral modeling
c) Annotational modeling
d) Process modeling
P.T.O.
SLR-CK – 11
*SLRCK11*
-2-
6) _________ organizes the behaviors of the system.
a) Class diagram
b) Use case diagram
c) Activity diagram
d) Interaction diagrams
7) An ___________ is ongoing non atomic execution within state-machine.
a) Activity
b) Entity
c) Process
d) None of these
8) A collection of operations that are used to specify a service of a class or
a component is known as ___________
a) Signal
b) Node
c) Interface
d) Component
9) ___________ specifies that the source instantiates the target template
using the given actual parameters.
a) Derive
b) Bind
c) Friend
d) None of these
10) Which of the following is the extensibility mechanism in the UML ?
a) Stereotype
b) Tagged value
c) Constraints
d) All the above
B) State True or False :
4
1) Stub specifies a package that serves as a proxy for the public contents of
another package.
2) Any sequence need not have a beginning.
3) A use case may have variants.
4) An event is the specification of a significant occurrence that has a location
in time and space.
2. A) Write short notes on the following :
8
i) Generalization Relationship in UML.
ii) Advanced Classes in UML.
B) Write difference between following :
i) Sequence diagram and collaboration diagram.
ii) Simple class and active class.
6
*SLRCK11*
-3-
SLR-CK – 11
3. Answer the following :
14
1) Building Blocks of UML.
2) Explain Interfaces in UML.
4. Answer the following :
14
1) Explain Class Diagram in UML.
2) Explain Events and Signals.
5. Answer the following :
14
1) Explain different types of objects used in component Diagram.
2) Explain the Fork, Merge, Branch and Join from Activity Diagram in UML.
6. Answer the following :
14
1) Which are the Structural diagrams in UML ? Explain any one of them.
2) Draw use case diagram for Online Shopping System.
7. Explain the following terms :
14
1) Process and Threads.
2) State Machine.
_______________
SLR-CK – 12
*SLRCK12*
Seat
No.
M.Sc. – I (Semester – II) Examination, 2014
COMPUTER SCIENCE
DBMS (Paper – VIII)
Day and Date : Saturday, 22-11-2014
Time : 11.00 a.m. to 2.00 p.m.
Total Marks : 70
Instructions : 1) Question No. 1 and 2 are compulsory.
2) Attempt any 3 questions from Q. No. 3 to Q. No. 7.
3) Figures to the right indicate full marks.
1. A) Choose correct alternatives :
10
1) ___________ is a collection of interrelated data and a set of programs to
access those data.
a) Program
b) DBMS
c) File
d) None of these
2) The collection of information stored in the database at a particular moment
is called ___________ of the database.
a) Instance
b) Schema
c) Subschema
d) None of these
3) A ___________ is an association among several entities.
a) Attributes
b) Entity
c) Relationship
d) Association
4) Data about data is called ___________
a) Attribute
b) Entity
c) Relation
d) Metadata
5) In database system ___________ subsystem compiles and executes
DDL and DML statements.
a) Transaction manager
b) Query processor
c) Storage manager
d) Buffer manager
P.T.O.
SLR-CK – 12
*SLRCK12*
-2-
6) The set of permitted values for an attribute is called ___________
a) Field value
b) Tuple
c) Domain
d) None of these
7) DCL stands for ___________
a) Data Control Language
b) Domain Control Language
c) Disk Control Language
d) Data Compression Language
8) In SQL the ___________ statement is used to confer authorization.
a) Update
b) Revoke
c) Grant
d) Administration
9) We say that a relation schema R is in ___________ if the domains of all
attributes of R are atomic.
a) 2 NF
b) 3 NF
c) 1 NF
d) 4 NF
10) ACID stands for ___________
a) Atomicity, Constraint, Isolation, Durability
b) Atomicity, Constraint, Integrity, Durability
c) Atomicity, Consistency, Integrity, Durability
d) Atomicity, Consistency, Isolation, Durability
B) Fill in the blanks :
4
1) ________ function returns the smallest integer greater than or equal to n.
2) In SELECT command __________ clause is used for getting rows from
query in specific order.
3) In SQL __________ operator is used to compare multiple values.
4) __________ execution of transactions guarantees that consistency is
preserved.
2. A) Write short notes on the following :
8
i) DBA
ii) Integrity rules.
B) Answer the following :
i) What problems are caused by data redundancies ? Can data redundancies
be completely eliminated when the database approach is used ?
ii) What do you mean by function dependency ? Explain with example.
6
*SLRCK12*
-3-
SLR-CK – 12
3. Answer the following :
a) Explain the architecture of DBMS.
8
b) Define various types of keys with example.
6
4. Answer the following :
a) What is normalization ? Explain 3NF with example.
8
b) Explain multivalued functional dependency with suitable example.
6
5. Answer the following :
a) What are the fundamental operations in relational algebra ? Explain with
suitable example.
7
b) What are different symbols used in E-R diagram ?
7
6. Answer the following :
a) Consider the relations :
8
SalesPerson(Sno, Name, Salary)
Order(OrdNo. Sno. CustName, Amount)
Customer(CustName, City)
Write SQL commands for following queries :
i) Find name and salary of all sales persons.
ii) Names of sales persons who booked an order of at least Rs. 10,000/iii) Names of customers living in city “A” and ordered for at least Rs. 20/iv) Find total number of orders booked by customer “Sachin”.
b) Explain the differences between standalone database and distributed database. 6
7. Answer the following :
a) Explain view serializability and conflict serializability.
6
b) Describe nested tables and varying arrays.
8
_____________________
SLR-CK – 13
*SLRCK13*
Seat
No.
M.Sc. – II (Semester – III) Examination, 2014
COMPUTER SCIENCE
Paper – IX : Java Programming
Day and Date : Friday, 14-11-2014
Time : 3.00 p.m. to 6.00 p.m.
Max. Marks : 70
Instructions : 1) Question No. 1 and 2 are compulsory.
2) Attempt any 3 questions from Q. No. 3 to Q. No. 7.
3) Figures to the right indicate full marks.
1. A) Choose correct alternatives :
10
I) Which of the following statements about the Java language is true ?
A) Java supports only procedural approach towards programming
B) Both Procedural and Object Oriented Programming are supported in
Java
C) Java supports only Object Oriented Programming approach
D) None of the above
II) Which is not a valid keyword in java ?
A) Null
B) Transient
C) Synchronized
D) Native
III) A collection of methods with no implementation is called an _________
A) Polymorphism
B) Inheritance
C) Interface
D) Data Binding
IV) If you access an uninitialized local variable will result
A) Syntax Error
B) Compile Time Error
C) Run Time Error
D) No Error
V) Which is right way to creating an array of integer ?
A) javaArray = new int[10];
B) javaArray new = myArray[10];
C) int[ ] javaArray = new int[10];
D) A) and C) both
P.T.O.
SLR-CK – 13
*SLRCK13*
-2-
VI) Which keyword is used to inherit class ?
A) inherit
B) extends
C) inheritance
D) extend
VII) Program which executes applet is known as
A) applet engine
B) virtual machine
C) JVM
D) None of above
VIII) What will be the output of the program ?
class MyClass
{
int i;
float j;
public static void main(String[ ] args)
{
System.out.println(''i = '' + i +''j ='' + j);
}
}
A) i = 0 j = 0.0
B) i = 0 j = 0.000000
C) Compile Time Error
D) None of the above
IX) Overloaded methods are differentiated by
A) Number of arguments
B) Data type of arguments
C) Number and the data type of the arguments
D) None of the above
X) Package of drawstring( ) method is
A) java.applet
B) java.io
C) javax.swing
D) java.awt
B) State true/false :
i) JVM is platform dependent.
ii) The modifiers public and static cannot written in either order “public static”
or “static public”.
iii) Interfaces can be instantiated.
iv) Assignment operator is evaluated Left to Right.
4
*SLRCK13*
-3-
SLR-CK – 13
2. A) Write short notes on the following :
8
i) throw and throws.
ii) break, continue and return.
B) Answer the following :
6
i) Discuss various primitive data types supported by java.
ii) Explain why java is considered as the best language for internet
applications.
3. Answer the following :
14
A) What do you stand by multithread programming ? Explain with a simple suitable
example.
B) Write a program in java to create first 100 Fibonacci numbers.
4. Answer the following :
14
A) What are adaptor classes ?
B) WAP to copy contents of one file to another file using FileInputStream
and FileOutputStream classes.
5. Answer the following :
14
A) Assume that there is a table named as student in MS-Access with the following
fields : Std_Rollno, name, course, ph_no. Write a java program to insert and
then display the records of the table using JDBC.
B) What are different ways to create threads ? Explain with examples.
6. Answer the following :
14
A) Define package. Explain how to create user defined packages in java.
B) Explain about abstract classes and abstract methods.
7. Answer the following :
14
A) Explain life cycle of applet. Write a program to display image on Applet.
B) Explain keyword super and this with a program.
_____________________
SLR-CK – 14
*SLRCK14*
Seat
No.
M.Sc. (Part – II) (Semester – III) Examination, 2014
COMPUTER SCIENCE
Paper – X : Artificial Intelligence
Day and Date : Monday, 17-11-2014
Time : 3.00 p.m. to 6.00 p.m.
Max. Marks : 70
Instructions : I) Q. 1 and Q. 2 are compulsory.
II) Attempt any three questions from Q. 3 to Q. 7.
III) Figures to right indicate full marks.
1. A) Choose the correct alternative :
10
1) A _________________ has the necessary and sufficient means for general
intelligent action.
a) Psychological Symbol System
b) Natural Language Symbol System
c) Physical Symbol System
d) None of these
2) The _________________ is a knowledge acquisition system for heuristic
classification problem.
a) SALT
b) MOLE
c) MYCIN
d) DENDRAL
3) A ___________ is a process that converts a flat input sentence into
hierarchical structure that corresponds to the units of meaning in the
sentence.
a) Syntactic Processing
b) Case Grammar
c) Fuzzy Logic
d) Unification Grammars
4) The primitive act __________ stands for transfer of the abstract relationship.
a) PTRANS
b) MTRANS
c) MBUILD
d) ATRANS
P.T.O.
SLR-CK – 14
*SLRCK14*
-2-
5) The _____________ operated by matching the left sides of the rules against
the user’s last sentence and using the appropriate right side to generate a
response.
a) Pragmatics system
b) Non-monotonic system
c) ELIZA system
d) Syntactic analysis
6) A measure of Belief measures the extent to which the ___________ supports
the hypothesis.
a) Fuzzy logic
b) Evidence
c) Hypothesis
d) Certainty
7) A predicate form of sentence – “All literate, who are not illiterate are
well-educated” can be represented as
a) ∀ x : ¬ literate(x )
illiterate (x) → educated(x)
b) ∀ x : illiterate(x) ¬ literate (x) → educated(x)
c) ¬ literate (x) ¬ illiterate(x) → ¬ educated(x)
d) ∀x : literate (x) ¬ illiterate(x) → educated(x)
8) A most commonly used procedure is _____________ , which exploits a
proof by contradiction strategy.
a) Procedural knowledge
b) Resolution
c) Computable functions
d) Bayes theorem
9) A most useful form of inference is _________ , in which elements of specific
classes inherit attributes and values from more general classes in which
they are included.
a) Inferential efficiency
b) Procedural inheritance
c) Property inheritance
d) None of these
10) To build a system to solve a particular problem, there is a need to do
____________ and represent the task knowledge that is necessary to
solve the problem.
a) Define the problem
b) Analyze the problem
c) Search
d) Isolate
*SLRCK14*
-3-
SLR-CK – 14
B) State True or False :
4
1) P(Hi\E) is the probability we will observe evidence E given that hypothesis
i is true.
2) Mundane tasks include task related to Games, Mathematics.
3) In monotonic production system, the application of a rule never prevents
the later application of another rule that could also have been applied at the
first rule was selected.
4) To continue the search until no such drastic change occurs from one level
to the next is called as waiting for quiescence.
2. A) Write a short note :
8
1) Constraint Satisfaction
2) Semantic Net.
B) Answer the following :
6
1) What do you mean by Frames ?
2) State in brief Fuzzy Logic.
3. Answer the following :
A) What do you mean by Heuristic ? Discuss Blocks word problem as shown in
figure using Local and Global heuristic function.
7
B) Define Expert Systems. Explain in detail Expert System Shell and capabilities
needed as part of Explanation.
7
SLR-CK – 14
-4-
*SLRCK14*
4. Answer the following :
A) Define Reasoning. Describe in detail various Matching strategy.
7
B) Define Script. Write a Computer Laboratory script with a story :
7
“Sushant went to Computer Lab. He Turn on Computer. He started application
to draft JAVA program. He compiles program with no errors. He went to
Professor to note down the assignment.”
5. Answer the following :
A) State and discuss in detail key dimensions of Problem Characteristics.
7
B) Define Artificial Intelligence. Discuss in detail various approaches to
knowledge representation.
7
6. Answer the following :
A) Discuss in detail steps involved to convert well formed formulas to Conjunctive
Normal Form with suitable example.
7
B) What do you mean by Natural Language Processing ? Discuss and differentiate
the steps in Natural Language Processing.
7
7. Answer the following :
A) Discuss in detail the Water Jug Problem with 5-gallon and 7-gallon jug; neither
has any markers on it. How to get exactly 1 gallon of water into 7-gallon jug ? 7
B) Discuss in detail the procedure of MINMAX search in Game Playing.
_____________________
7
SLR-CK – 15
*SLR-CK-15*
Seat
No.
M.Sc. (Part – II) (Semester – III) Examination, 2014
COMPUTER SCIENCE
Mobile Computing (Paper – XI)
Day and Date : Wednesday, 19-11-2014
Time : 3.00 p.m. to 6.00 p.m.
Max. Marks : 70
Instructions : 1) Question No. 1 and 2 are compulsory.
2) Attempt any 3 questions from Q. No. 3 to Q. No. 7.
3) Figures to the right indicate full marks.
1. A) Choose correct alternatives :
10
i) Several antennas can be combined on single pole to construct
a) Clustered Cell
c) Sectorized Antenna
b) Clustered Antenna
d) Antenna Group
ii) ________________ is the set of techniques that allows the simultaneous
transmission of multiple signals across a single data link.
a) Demodulating
b) Multiplexing
c) Compressing
d) None of the above
iii) The systems were “cellular” because coverage areas were split into
_____________ each of which is served by a low power transmitter and
receiver.
a) cells
c) cluster
b) channels
d) capacity
iv) Larger cells are more useful in _____________
a) densely populated urban areas b) rural areas
c) lightly populated urban areas
d) mountainous areas
v) BSS in GSM stands for _____________
a) Basic Service Set
b) Base Station Subsystem
c) Basic Station System
d) Basic Service System
P.T.O.
SLR-CK – 15
*SLR-CK-15*
-2-
vi) Beacon contains
a) Timestamp
b) Synchronization information
c) Power Management and Roaming Information
d) All of these
vii) What is the basic service unit of cellular telephony ?
a) Location area
b) Cell
c) PLMN service area
d) MSC/VLR service area
viii) MSISDN number consists of
a) Country Code
b) National Destination Code
c) Subscriber number
d) All of these
ix) In IEEE 802.11 Wireless LAN which signal is used for synchronization.
a) Probe
b) Beacon
c) PS Poll
d) Sync
x) Which of the following is not a classical TCP mechanism ?
a) Slow Start
b) Fast recovery
c) Selective retransmission
d) Congestion control
B) Fill in the blanks or True/False :
4
i) _____________ protocol is used for IEEE 802.11 physical layer frame.
ii) Access Point in main controller in ad-hoc wireless network. (True/False)
iii) In PRMA _____________ reservation scheme is used.
iv) In DSSS chipping sequence is used to spread the signal. (True/False)
2. A) Write short notes on the following :
(4+4)
i) Mobile TCP
ii) Piconet.
B) Answer the following :
i) Discuss about MOC.
ii) Explain signal propagation.
(3+3)
*SLR-CK-15*
-3-
SLR-CK – 15
3. Answer the following :
(7+7)
A) How the problem of hidden and exposed terminal is solved using MACA ?
B) What is digital modulation ? Explain three basic techniques of it.
4. Answer the following :
(7+7)
A) Explain different mobile services provided by GSM.
B) How the power management is performed in IEEE 802.11 ?
5. Answer the following :
(7+7)
A) Explain FHSS in detail with types of hopping. Give the description about its
transmitter and receiver with diagram.
B) What are the various issues to be considered in designing the wireless LAN
environment ?
6. Answer the following :
(7+7)
A) What are the different entities and terminologies for mobile IP ?
B) Discuss in detail the Mobile Terminated Call scheme.
7. Answer the following :
(7+7)
A) Explain indirect TCP with advantages.
B) What is handover ? Explain its types with diagram.
_____________________
SLR-CK – 16
*SLRCK16*
S
N
e
o
a
t
.
M.Sc. (Part – II) (Semester – III) Examination, 2014
COMPUTER SCIENCE (Paper – XII)
Modeling and Simulation
Day and Date : Friday, 21-11-2014
Time : 3.00 p.m. to 6.00 p.m.
Total Marks : 70
Instructions : 1) Question No. 1 and 2 are compulsory.
2) Attempt any three questions from Q. 3 to Q. 7.
3) Figures to the right indicate full marks.
1. A) Select the correct alternative :
10
i) PERT is used for the project involving activity of non-repetitive nature in
which time estimation are __________
a) Certain
c) Deterministic
b) Uncertain
d) Both b) and c)
ii) Simulation of system in which the state changes smoothly with time are
called _____________
a) Continuous system
c) Both a) and b)
b) Discrete system
d) None of these
iii) Which of the following is not an assumption underlying the fundamental
problem of EOQ ?
a) Demand is known and uniform
b) Holding cost per unit per time is constant
c) Lead time not zero
d) Shortages are not permitted
iv) In queue model completely specified in the symbolic form (a/b/c/) : (d/e),
the third symbol ‘c’ specifies ____________
a) The number of customers arrive
b) The number of servers
c) The distribution of arrival
d) The distribution of departure
P.T.O.
SLR-CK – 16
*SLRCK16*
-2-
v) If in Markov chain of two states j and k, one step transition probabilities
are Pjj = 1, Pjk = 0, Pkj = 0, Pkk = 1 then value of
a) 0.5
c) 0.4
(
4
is
)
2
j
k
b) 1
d) 0
vi) For _______________ distribution mean and variance are same.
a) Binomial distribution
b) Poisson distribution
b) Bernoulli distribution
d) None of these
vii) The time interval between successive arrival of customer in the queue
follows ________________ distribution.
a) Geometric
c) Binomial
b) Hypergeometric distribution
d) Exponential
viii) Time gap between placing of an order and its actual arrival in the inventory
is known as ______________
a) Lead time
c) Both a) and b)
b) Demand
d) None of the above
ix) In M/M/1 : /FCFS queue model if is mean customer arrival rate and
is the mean service rate then the probability of server being busy is equal
to
a)
b)
c)
d)
x) Markov chain said to be erotic chain if ________________ of whose states
are ergodic.
a) One
b) Some
c) All
d) None
B) Fill in the blanks :
4
i) The long form of the CPM is ____________
ii) Chapman-Kolmogorov equation is Pij (t + T) = ______________
iii) The time between the placement of two successive order is referred as an
___________
iv) Let is arrival rate and is service rate, if
and ______________ with time.
>
the queue is formed
*SLRCK16*
SLR-CK – 16
-3-
2. A) i) What are the advantages and disadvantages of simulation ?
ii) Explain the concept of anticipation inventory with example.
4
4
B) i) A road transport company has one reservation clerk on duty at a time. He
handles information of bus schedules and makes reservations. Customers
arrive at a rate of 8 per hour and the clerk can service 12 customers on an
average per hour. After stating your assumption, find the average waiting
time of customer.
ii) Write a note on queue configuration.
3. A) Explain the pure birth process.
3
3
7
B) The demand rate for a particular item is 12000 units/year. The ordering cost
of Rs. 1000 per order and the holding cost is Rs. 0.80 per month. If no
shortage are allowed and the replacement is instantaneous the determine
7
i) Economic order quantity
ii) Number of order per year.
4. A) Describe the deterministic inventory model of EOQ with uniform demand and
no shortages.
7
B) For various activity in the particular project the expected time (in days) of
completions are as follow :
7
A
D
u
c
r
t
i
a
v
t
i
i
t
o
y
n
!
$
!
$
!
&
"
!
#
"
"
#
!
Draw a network diagram and identify the critical path.
5. A) Generate the five successive random number Xi, i = 1, 2, 3, 4, 5 by using
Xi + 1 = Xi*a (modulo m), starting with seed X0 = 3 and parameters a = 7 and
m = 15 (where m means that the number {Xi*a} is divided by m repeatedly till
the reminder is less than m).
B) Explain the system of steady-state equation.
6. A) Give the steps of Monte-Carlo simulation.
B) Explain the generation of a random sample from exponential distribution.
7
7
7
7
7. A) Explain the concept of queue discipline.
7
B) Explain the Poisson process {N(t); t
process.
7
0}. Show that N(t) follows Poisson
_____________________
SLR-CK – 17
*SLRCK17*
S
N
e
o
a
t
.
M.Sc. (Part – II) (Sem. – IV) Examination, 2014
COMPUTER SCIENCE (Paper – XIII)
Distributed Operating System
Day and Date : Saturday, 15-11-2014
Time : 3.00 p.m. to 6.00 p.m.
Max. Marks : 70
Instructions : 1) Question No. 1 and 2 are compulsory.
2) Attempt any 3 questions from Q. No. 3 to Q. No. 7.
3) Figures to the right indicate full marks.
1. A) Choose correct alternatives :
10
1) In a __________ (loosely coupled) system, the processors do not share
memory or a clock.
A) Multiprocessor
B) Distributed
C) Remote
D) Local
2) __________ communication is from one sender to multiple receivers.
A) Many to one
B) Many to many
C) One to many
D) One to one
3) LAN stands for __________
A) Large Area Network
B) Local Area Network
C) Long Area Network
D) Lower Area Network
4) The software layer, nearest to hardware, which facilitates launching all the
other software utilities and application, is called the __________
A) Information technology
B) Information system
C) Operating system
D) All of the above
5) All distributed systems are __________
A) SISD
B) SIMD
C) MISD
D) MIMD
P.T.O.
SLR-CK – 17
-2-
*SLRCK17*
6) ISO stands for __________
A) International Organization for Standardization
B) International Standard Organization
C) International Standard Operation
D) Important Standard Operation
7) When a packet is sent to an address, it is automatically delivered to all
machines listening to the address. This technique is called __________
A) Unicasting
B) Broadcasting
C) Multicasting
D) Point to point transmission
8) A _________ OS allows and manages several programs to be simultaneously
resident in main memory.
A) Multi-programming
B) Single-programming
C) External-programming
D) All of the above
9) When the job is completed, the output is actually printed; this form of
processing is called ____________
A) Resource allocator
B) Control program
C) Spooling
D) All of the above
10) A computer system dedicated to a single user. This type of computer
system is usually referred to as ___________
A) Mainframe computer
B) Mini computer
C) Super computer
D) Personal computer
B) State true or false :
1) An open system is prepared to communicate with any other open system
by using standard rules.
2) Packing parameters into a message is called parameter marshalling.
3) Location transparency does not refer to the fact that is in a true distributed
system.
4) Concurrency transparency means multiple users can share resources
automatically.
4
*SLRCK17*
-3-
SLR-CK – 17
2. A) Write short notes on the following :
8
i) Remote access file service interface.
ii) Lamport’s happens before relation.
B) Answer the following :
6
i) What do you mean by Windows NT and Novel Netware ?
ii) What do you mean by Client server model ?
3. Answer the following :
14
A) Define deadlock. State and explain in detail the necessary conditions to occur
a deadlock.
B) Explain in detail Layered protocol with necessary diagram.
4. Answer the following :
14
A) Explain in detail the concept of remote procedure call.
B) Explain in detail how deadlock prevention took place in distributed systems.
5. Answer the following :
14
A) What is the mutual exclusion ? Explain the central and distributed algorithms.
B) What is distributed file system ? Explain the implementation of it in detail.
6. Answer the following :
14
A) Explain in detail the workstation model as the system model.
B) Explain in detail the concept of atomic transaction.
7. Answer the following :
14
A) Define Thread. Explain in detail the thread usage in terms of three organizations
of it in a process.
B) Explain in detail advantages and disadvantages of distributed systems over
centralized and over personal computer systems.
_____________________
SLR-CK – 18
*SLRCK18*
Seat
No.
M.Sc. (Semester – IV) Examination, 2014
COMPUTER SCIENCE
Data Mining and Warehouse (Paper – XIV )
Day and Date : Tuesday, 18-11-2014
Time : 3.00 p.m. to 6.00 p.m.
Max. Marks : 70
Instructions : 1) Question No. 1 and 2 are compulsory.
2) Attempt any 3 questions from Q. No. 3 to Q. No. 7.
3) Figures to the right indicate full marks.
1. A) Choose correct alternatives :
10
1) The following is true of three-tier data warehouses
a) Once created, the data marts will keep on being updated from the data
warehouse at periodic times
b) Once created, the data marts will directly receive their new data from
the operational databases
c) The data marts are different groups of tables in the data warehouse
d) A data mart becomes a data warehouse when it reaches a critical size
2) __________ will answer questions you did not think to ask of your data.
a) Data mining
b) Data extrapolation
c) Knowledge discovery
d) Data enlightenment
3) The following technology is not well-suited for data mining
a) Expert system technology
b) Data visualization
c) Technology limited to specific data types such as numeric data types
d) Parallel architecture
4) The slice operation performs a selection on ___________ of the given
cube.
a) One dimension
b) Two dimension
c) More than two dimension
d) None of the above
P.T.O.
SLR-CK – 18
-2-
*SLRCK18*
5) ________ is the oldest and most well known statistical technique that the
data mining community utilizes.
a) Regression
b) Clustering
c) Decision Trees
d) None of the above
6) It is difficult to find strong associations among data items at low or primitive
levels of abstraction due to the ___________ of data in multidimensional
space.
a) Sparsity
b) Scarcity
c) Plenty
d) Excess
7) ___________ attributes are numeric and have an implicit ordering among
values.
a) Quantitative
b) Nominal
c) Categorical
d) None of the above
8) In the K-means clustering algorithm the distance between cluster centroid
to each object is calculated using __________ method.
a) Euclidean distance
b) Clustering distance
c) Central distance
d) Cluster width
9) Hierarchical clustering may be represented by a two-dimensional diagram
known as ____________
a) Dendrogram
b) Cladogram
c) Histogram
d) None of the above
10) ___________ is the process of removing attributes in the data that are
irrelevant to the classification or prediction task.
a) Relevance analysis
b) Data cleaning
c) Data transformation
d) Normalization
B) Fill in the blanks :
1) Regression, classification and __________ are the data mining tasks.
2) The process of removing the deficiencies and loopholes in the data is
called as _____________ up of data.
3) Pivot is also called ___________
4) The _____________ schema is a variant of the star schema model, where
some dimension tables are normalized.
4
*SLRCK18*
-3-
SLR-CK – 18
2. A) Write short notes on the following :
8
i) Data Transformation
ii) Model-Based Clustering.
B) Answer the following :
6
i) What is data cube ? Explain star schema.
ii) Explain in short types of data in cluster analysis.
3. Answer the following :
A) Explain data mining applications.
7
B) Explain data mining primitives with example.
7
4. Answer the following :
A) Discuss 3-tier architecture of data warehouse with a neat diagram.
Explain in detail the functionality of each component.
8
B) What is noisy data ? Explain different techniques to smooth out the data to
remove the noise.
6
5. Answer the following :
A) Explain decision tree induction method.
7
B) What are the different criteria on which classification and prediction methods
can be evaluated ?
7
6. Answer the following :
A) Discuss the concepts of frequent itemset, support and confidence.
7
B) Explain trends in data mining.
7
7. Answer the following :
A) What is meant by hierarchical clustering ? Explain, how agglomerative
method is different from divisive clustering method.
8
B) Explain Bayesian classification scheme.
6
_____________________
SLR-CK – 19
*SLR-CK-19*
Seat
No.
M.Sc. – II (Semester – IV) Examination, 2014
COMPUTER SCIENCE
Digital Image Processing (Paper – XV)
Day and Date : Thursday, 20-11-2014
Time : 3.00 p.m. to 6.00 p.m.
Max. Marks : 70
Instructions : 1) Question No. 1 and 2 are compulsory.
2) Attempt any 3 questions from Q. No. 3 to Q. No. 7.
3) Figures to the right indicate full marks.
1. A) Choose correct alternatives :
1) The outputs of object recognition are generally
10
a) Images
b) Attributes of images
c) Both images and attributes of images
d) Either images or attributes of images
2) An image of size 10 × 5 pixel formed with 256 gray levels need
______________ bits of storage space.
a) 400
b) 50
c) 12800
d) 500
3) D4 distance between (7, 3) and (5, 8) is ______________
a) 3
b) 1
c) 5
d) 13
4) Averaging filter is a ______________
a) Smoothing linear filter
b) Sharpening linear filter
c) Order statistics filter
d) Median filter
5) Arrange the following filters from very smooth filter to very sharp filter.
a) Butterworth filter, Gaussian filter, Ideal filter
b) Gaussian filter, Butterworth filter, Ideal filter
c) Ideal filter, Gaussian filter, Butterworth filter
d) Ideal filter, Butterworth filter, Gaussian filter
P.T.O.
SLR-CK – 19
-2-
*SLR-CK-19*
6) Midpoint filter is one of the ______________ filters.
a) Mean
b) Adaptive
c) Order statistics
d) Frequency domain
7) To eliminate small holes in the image the best morphological tool is
______________
a) Dilation
b) Erosion
c) Opening
d) Closing
8) In an image whose gray level profile is ramp or slope, its first order
derivative is ______________
a) Zero
b) Constant
c) Monotonically increasing
d) Transition between positive and negative
9) The four directional chain code of an object is 0003230322210121. Its
shape number is ______________
a) 0033113300331133
b) 0033003311331133
c) 0033113311330033
d) 0033003311330033
10) The American Banker Association E-13B character recognition system
recognizes the characters based on the ______________
a) Area of ink under reader head
b) Difference of area of ink between previous and present position
c) Width of ink bar
d) Length of ink bar
B) Fill in the blanks :
1) The distance between a pixel and its diagonal neighbour is ______________
units.
2) According to Fourier any function which periodically repeats itself may be
written as the ______________ of different frequencies, each multiplied
by a different coefficient.
3) The translation of set A by point Z = {z1 , z2}, denoted (A)z is defined as
______________
4) The expression y = A(x – mx) is called as ______________
4
2. A) Write short notes on the following :
i) Role of bit planes in image.
ii) How homomorphic filtering differs from other frequency domain filtering ?
Discuss.
8
*SLR-CK-19*
-3-
SLR-CK – 19
B) Answer the following :
i) Find the shortest digital path between P and Q using m-adjacency.
ii) Use the specific primitives a, b, c and d given as
6
and
respectively and build the following structure :
3. Answer the following :
A) Explain nearest neighbourhood, pixel replication and bilinear interpolation
techniques.
B) Perform opening of following structure using a circle of 1 cm radius :
14
SLR-CK – 19
*SLR-CK-19*
-4-
4. Answer the following :
14
A) Discuss similarity and dissimilarity between different basic gray level
transformations.
B) Fill the following region using morphological region filling algorithms :
5. Answer the following :
14
A) Discuss one dimensional Fourier transform and its inverse with an example.
B) Compute the covariance matrix for the following vectors :
(0, 1, 0, 0)T, (0, 0, 0, 1)T, (1, 1, 1, 1)T and (1, 0, 1, 0)T.
6. Answer the following :
14
A) What are the different types of discontinuities ? How they are detected ?
Briefly explain.
B) The two classes of objects denoted by ω1 and ω2 have sample mean vectors
m1 = (2, 7, 5) and m2 = (8, 4, 2) respectively. Compute decision boundary
between these two objects.
7. Answer the following :
14
A) Explain minimum distance classifier method for pattern matching with example.
B) Compute the distances between following objects and find out which of them
are nearest :
(a)
(b)
(c)
_____________________
(d)
*SLRCK20*
SLR-CK – 20
Seat
No.
M.Sc. – II (Semester – IV) (Computer Science) Examination, 2014
.NET (Paper – XVI)
Day and Date : Saturday, 22-11-2014
Time : 3.00 p.m. to 6.00 p.m.
Max. Marks : 70
Instructions : 1) Question No. 1 and 2 are compulsory.
2) Attempt any 3 questions from Q. No. 3 to Q. No. 7.
3) Figures to the right indicate full marks.
1. A) Each question below gives a multiple choice of answers, choose the most
appropriate one :
10
1) A ______________ can override method from its base class.
a) sub class
b) sealed class
c) partial class
d) super class
2) A ______________ method of class that’s run as soon as it is instantiated.
a) constructor
b) accessor
c) mutator
d) init()
3) The + = and – = are ______________ kind of operator.
a) binary
b) ternary
c) unary
d) compound
4) There are about ______________ reserved words in C#.
a) 87
b) 77
c) 76
d) 78
5) ______________ is the way of listing all of the namespaces used in
the program.
a) Namespace
b) Using
c) Include
d) Import
6) An instance of ___________ collection only works with one specific type.
a) Dictionary
b) List
c) Generic
d) Array
P.T.O.
SLR-CK – 20
-2-
*SLRCK20*
7) All generic collection implements ______________ interface.
a) Innumerable
b) Enumeration
c) Generic
d) Abstract
8) ______________ is an easy way to keep track of categories.
a) Enum
b) Attributes
c) Modifiers
d) Constants
9) ______________ binary formatter method reads an object from stream.
a) Serialize
b) Desearialize
c) Marshall
d) UnMarshall
10) ______________ encoding system that assigns unique number of each
character.
a) Unicode
b) Binary
c) EBCDIC
d) ASCII
B) State following statements are true or false :
4
1) Fileinfo class lets user perform all operations in the file class for specific
file.
2) Accessor method gets the value of a property.
3) The Tab control of windows form that lets you to create tabbed application.
4) Two references means there are two ways to change an objects data.
2. A) Write short notes on the following :
8
i) Core services of DOT NET Framework.
ii) DOT NET Layered architecture.
B) Answer the following :
i) Can constructor of class is defined as static ? Explain with example.
ii) What is Delegate ? Explain the properties of Delegate.
6
*SLRCK20*
-3-
SLR-CK – 20
3. Answer the following :
A) Differentiate in between ASP and ASP.NET.
7
B) What are sealed classes ? What is the benefit of using sealed class ?
7
4. Answer the following :
A) What is master page ? Write stepwise process of creating master page.
7
B) What is inheritance ? Explain how inheritance is restricted in C#.
7
5. Answer the following :
A) What is difference in regular object reference and an interface reference ?
7
B) Write C# program to find maximum and minimum number from an array.
7
6. Answer the following :
A) Explain ASP.NET page events and attributes of page directives with example. 7
B) What is Validator ? Describe purpose of regular expression validator
with example.
7
7. Answer the following :
A) Explain classification of DOT NET Data providers.
7
B) Define WebForm. Explain how to maintain the state of Webform with
suitable example.
7
_____________________
SLR-CK – 1
*SLRCK1*
Seat
No.
M.Sc. – I (Semester – I) Examination, 2014
COMPUTER SCIENCE (New)
Object Oriented Programming using C++ (Paper – I)
Day and Date : Friday, 14-11-2014
Time : 11.00 a.m. to 2.00 p.m.
Max. Marks : 70
Instructions : 1) Question No. 1 and 2 are compulsory.
2) Attempt any three questions from Q. No. 3 to Q. No. 7.
3) Figures to the right indicate full marks.
1. A) Choose correct alternatives :
10
1) Which of the following is not a type of constructor ?
A) Copy constructor
B) Friend constructor
C) Default constructor
D) Parameterized constructor
2) Which of the following is not the member of class ?
A) Friend function
B) Static function
C) Const. function
D) Virtual function
3) A class is a ___________ data type.
A) Primitive
B) Derived
C) User-defined
D) All of these
4) ___________ keyword is used to declare integer variables.
A) int
B) Integer
C) Float
D) Character
5) Which of the following approach is adapted by C++ ?
A) Top-down
B) Bottom-up
C) Right-left
D) Left-right
6) A/an ___________ function is a function that is expanded in line when it
is invoked.
A) Inline
B) Friend
C) Complex
D) Member
P.T.O.
SLR-CK – 1
*SLRCK1*
-2-
7) Which of the following concepts means wrapping up of data and function
together ?
A) Abstraction
B) Inheritance
C) Polymorphism
D) Encapsulation
8) Which of the following problem causes an exception ?
A) A run-time error
B) A problem in calling function
C) A syntax error
D) Missing semicolon in statement in main()
9) The mechanism of deriving a new class from base is known as
___________
A) Abstraction
B) Inheritance
C) Polymorphism
D) Encapsulation
10) The scope resolution operator is represented by ___________
A) ?:
B) ->
C) ::
D) #
B) State whether following statements are true or false :
4
1) Manipulators are operators that are used to format the data display.
2) A constructor has the different name as that of a class.
3) A virtual function can be a friend of another class.
4) By default, members of the class are public.
2. A) Write a short note on following :
8
i) Algorithm
ii) Inline function
B) Answer the following :
i) What is function prototyping ? Explain with example.
ii) Explain difference between structure and union.
6
*SLRCK1*
-3-
SLR-CK – 1
3. Answer the following :
A) What is arrays of object ? Explain with example.
7
B) Explain the use of new and delete operator with example.
7
4. Answer the following :
A) Explain the importance of pointers to object with example.
7
B) Write a program in C++ to overload unary minus (–) operator.
7
5. Answer the following :
A) What is inheritance ? Explain different types of inheritances with example
and syntax.
7
B) What is virtual function ? Explain characteristics of virtual function.
7
6. Answer the following :
A) Write a program to implement parameterized constructor.
7
B) What is manipulator ? Explain the use of width() and fill() manipulators.
7
7. Answer the following :
A) What is file ? Explain different types of files.
7
B) Write a program which contains class named ‘MATRIX’. This class should
include two member functions get() and put() to input elements in matrix of
order 3×3 and display only diagonal elements of that matrix respectively.
_____________________
7
SLR-CK – 2
*SLRCK2*
Seat
No.
M.Sc. – I (Semester – I) Examination, 2014
COMPUTER SCIENCE (Paper – II)
Numerical Analysis (New)
Day and Date : Monday, 17-11-2014
Time : 11.00 a.m. to 2.00 p.m.
Max. Marks :70
Instructions : 1) Q. No. 1 and Q. No. 2 are compulsory.
2) Attempt any three questions from Q. No. 3 to Q. No. 7.
3) Figures to the right indicate full marks.
4) Use of calculator is allowed.
1. A) True or False (one mark each) :
4
i) Error in Trapezoidal rule is – (b – a) y(x).
ii) Newton’s forward interpolation formula is useful for interpolation near the
beginning of tabular values.
iii) Secant method is also called regula falsi method.
iv) Gaussian elimination method is used to reduce the given system to upper
triangular system.
B) Choose correct alternative (one mark each) :
5
i) The real root of the equation x3 – 9x + 1 = 0 lies between _____________
a) 0 and 1
b) 1 and 2
c) 2 and 3
d) 3 and 4
ii) If f(1) = 1, f(2) = 4, f(3) = 9, f(4) = 16 then this tabular values are interpolated
by a polynomial p(x) of degree _____________
a) 2
b) 3
c) 4
d) 5
iii) If xn is the nth iterate, the Newton Raphson formula is given by ____________
f (x n )
a) xn + 1 = xn – f′(x )
n
f(x n )
b) xn +1 = xn – f ( x )
n
f ( xn )
c) xn + 1 = xn + f ′(x )
n
d) None of these
P.T.O.
SLR-CK – 2
*SLRCK2*
-2-
iv) While applying Simpson’s
1 rd
rule the number of subintervals should be
3
______________
a) Multiple of 3
b) Multiple of 5
c) Odd
d) Even
v) If f(0) = 1 and f(1) = 3 then the unique polynomial of degree 1 is __________
a) 3 – 2x
b) x – 3
c) 2x + 1
d) 2x – 1
C) Define the following (one mark each) :
5
i) Round off error
ii) Rate of convergence
iii) Newton’s forward difference interpolation formula
iv) Eigen value and eigen vector of matrix
v) Significant digits.
2. i) Write the error’s in trapezoidal, Simpson’s
1 rd
3
and Simpson’s 3 8 th rule.
ii) Using Lagrange’s interpolation formula find sin (3) from following tabular
values.
x
0
y = sinx
0
2
3
4
4
0.9093 - 0.7568
iii) Write Newton’s forward and backward interpolation formula.
3
iv) Prove that :
4
δ2
a) μ = 1 +
4
2
b) Δ − ∇ = Δ∇
3. i) Derive Newton’s divided difference interpolation formula.
ii) Perform four iterations of Newton Raphson method to find a real root of the
equation x3 – 5x – 4 = 0.
7
7
*SLRCK2*
-3-
SLR-CK – 2
4. i) Explain Bisection method.
7
ii) Apply Lagrange’s method to find a cubic polynomial which approximates the
following data :
x
-2
-1
2
3
y = f(x)
- 12
-8
3
5
5. i) Use Gauss elimination to solve :
7
6
10x + y + z = 12
2x + 10y + z = 13
x + y + 3z = 5
1
ii) Evaluate
∫
0
1
1+ x 2
dx using Trapezoidal rule with h = 0.1.
8
6. i) Find the largest eigen value and corresponding eigen vector of the matrix
− 1⎤
⎥
4⎥
⎥
10 ⎥⎦
⎡ 1 3
⎢
⎢ 3 2
A= ⎢
⎢⎣ − 1 4
7
ii) Given the differential equation y′′ − xy′ − y = 0 with the conditions y(0) = 1,
y’(0) = 0. Use Taylor’s series method to determine the value of y(0.1).
⎡4 3
⎢
⎢2 3
7. i) Decompose the matrix A = ⎢
⎢⎣ 1 2
7
2⎤
⎥
4⎥
⎥ in to the form LU, where L is a lower
1⎥⎦
triangular matrix and U is unit upper triangular matrix.
7
ii) Using Newton’s forward interpolation formula to find y(4) from following data : 7
x
3
5
7
9
y = f(x)
13
31
57
91
11
111
––––––––––––––––––––
SLR-CK – 3
*SLRCK3*
Seat
No.
M.Sc. (Part – I) (Semester – I) Examination, 2014
COMPUTER SCIENCE
Paper – III : Software Engineering (New)
Day and Date : Wednesday, 19-11-2014
Time : 11.00 a.m. to 2.00 p.m.
Total Marks : 70
Instructions : 1) Question No. 1 and 2 are compulsory.
2) Attempt any three questions from Q. No. 3 to Q. No. 7.
3) Figures to the right indicate full marks.
1. A) Choose correct alternative :
10
1) Which of the following is a tool in design phase ?
a) Abstraction
c) Information hiding
b) Refinement
d) All of these
2) Which of the items listed below is not one of the software engineering
layers ?
a) Process
b) Tools
c) Methods
d) Manufacturing
3) Data dictionary contains details of
a) Data structures
c) Data stores
b) Data flows
d) All of these
4) SRS stands for _______________
a) Software Requirement Specification
b) Software Requirement Solutions
c) System Requirement Specification
d) None of the above
5) If requirements are frequently changing, which model is to be selected ?
a) Waterfall model
b) Prototyping model
c) Iterative model
d) RAD model
P.T.O.
SLR-CK – 3
*SLRCK3*
-2-
6) Which is not a characteristics of a good SRS ?
a) Correct
b) Complete
c) Consistent
d) Brief
7) Which one is a quality attribute ?
a) Reliability
b) Availability c) Security
d) All of the above
8) DFD stands for _________
a) Data Flow Design
b) Data Flow Diagram
c) Descriptive Functional Design
d) None of the above
9) Which one is not a strategy for design ?
a) Bottom up design
b) Top down design
c) Embedded design
d) Hybrid design
10) The extent to which different modules are dependent upon each other is
called ________________
a) Coupling
b) Cohesion
c) Modularity
d) Stability
B) State True or False :
4
1) Design patterns are best thought of as coding pattern.
2) Software design is an iterative generic process that may be applied without
modification to any software project.
3) Fault is defect in a program or mistake in program or error in the program.
4) Level-0 data flow diagram is similar to the context diagram.
2. A) Write short note on following :
8
1) Design post processing
2) Project metrics.
B) Answer the following :
1) Explain Metrics indicators.
2) Explain Object Oriented Testing.
6
*SLRCK3*
-3-
SLR-CK – 3
3. Answer the following :
A) What are the advantages and disadvantages of prototyping model ?
7
B) Explain evolutionary software process model.
7
4. Answer the following :
A) Explain MC Call’s Quality factors used in software engineering.
7
B) Explain function point metrics used in the analysis model.
7
5. Answer the following :
A) What is meant by software requirement specification ? Explain the
characteristics of good SRS.
7
B) Explain structured analysis in detail.
7
6. Answer the following :
A) Explain the various strategies used for software testing.
7
B) Explain how we can manage object oriented software projects.
7
7. Answer the following :
A) Explain functional modeling and behavioral modeling in detail.
7
B) What is software design ? Explain how we can transform informal design to a
detailed design.
7
_____________________
SLR-CK – 4
*SLRCK4*
S
N
e
o
a
t
.
M.Sc. (Part – I) (Semester – I) Examination, 2014
COMPUTER SCIENCE (Paper – IV)
Data Structures (New)
Day and Date : Friday, 21-11-2014
Time : 11.00 a.m. to 2.00 p.m.
Max. Marks : 70
Instructions : I) Q. 1 and Q. 2 are compulsory questions.
II) Attempt any three questions from Q. 3 to Q. 7.
III) Figures to right indicate full marks.
1. A) Choose the correct alternative :
10
1) The rule is therefore widely accepted that the associated ___________ is
made explicit in a declaration of the constant, variable or function.
a) Linked List
c) Binary Tree
b) Data Type
d) Sentence Case
2) A one of the demerit of priority queue is that it may lead to a problem of
____________, which keeps elements of queue in indefinite blocking state.
a) Fragmentation
c) Starvation
b) Compaction
d) Data Hiding
3) A _____________ matrix indicates almost all its elements are zero.
a) 3-Dimensional Matrix
c) Multidimensional Matrix
b) 2-Dimensional Matrix
d) Sparse Matrix
4) A ______________ cells, uses pointers to link successive list elements
as well as consisting of an element of the list and a pointer to the next cell
on the list.
a) Stack
c) Tree
b) Matrix
d) Singly Linked
5) It is difficult to find a “perfect” _____________ that is a function that has
no collisions.
a) Indexing Function
c) Hash Function
b) Do While Loop
d) Nested Function
P.T.O.
SLR-CK – 4
-2-
*SLRCK4*
6) A _____________ imposes a hierarchical structure on a collection of items.
Familiar examples of _________________ are genealogies and organization
charts.
a) Linear Search
b) Software
c) Tree
d) Queue
7) A _____________ algorithm is that it always chooses the closest vertex to
the source among those whose _____________ is not yet known.
a) Shortest path
b) Dynamic Programming
c) Backtracking
d) None of these
8) A _____________ data structure used to evaluate _____________
expression.
a) Queue and Algebraic
b) Queue and Arithmetic
c) Stack and Algebraic
d) Stack and Arithmetic
9) If a binary tree of arithmetic expression needs to be traversed and result
is in form that an operator is in between the operands, then it’s a
_____________ traversing.
a) Pre-order
b) In-order
c) Ascending
d) Descending
10) The _____________, which is a finite sequence of instructions, each of
which has a clear meaning ?
a) Data structure
b) Problem solver
c) Algorithm
d) Flowchart
B) State True or False :
1) An Insertion Sort is a good example of Divide and Conquer.
4
2) A dynamic programming produces the answer far more rapidly than the
try all permutations method.
3) The approach is called breadth-first because from each vertex that user
visit as user search as broadly as possible by next visiting all the vertices
adjacent to as well as each vertex visited is placed in the queue once.
4) This index is to be an integer between 0 and n-1, where n is the number of
elements, the size, of the array.
2. A) Write a short note :
1) Backtracking
2) Multidimensional Array.
8
*SLRCK4*
SLR-CK – 4
-3-
B) Answer the following :
6
1) What do you mean by Circular Queue ?
2) Define the term Data Structure.
3. Answer the following :
A) Define the term Doubly Linked List. Explain in detail various operations on
Doubly Linked List with suitable example.
B) What do you mean by Binary Tree ? Generate a Binary tree from given
series and show the results of Pre-order, In-order and Post-order traversing
at constructed Binary tree.
Series : 8, 91, 26, 83, 3, 12, 39, 5, 72, 100, 55, 60, 43, 10, 66.
7
7
4. Answer the following :
A) Define the meaning of Queue ? Explain in detail Dequeue and operations on it
with suitable example.
7
B) Enlist the various applications of stack. Discuss in detail the Tower of Hanoi
problem and its solution with respect to following Initial and to achieve the shown
Goal State.
7
(a) Initial State
(b) Goal State
5. Answer the following :
A) Define the term Sorting. Perform Bubble Sort and show the result in passes
on following series :
Series : 39, 200, 55, 6, 190, 49, 26, 133, 8, 69, 532, 13, 70.
B) Discuss representations and applications of Single Dimensional and Two
Dimensional with suitable example.
7
7
SLR-CK – 4
-4-
*SLRCK4*
6. Answer the following :
A) State the algorithm for conversion of infix into postfix string. Apply the same
on given infix expression show its conversion into postfix string.
7
Infix Expression : ((f + e) + b * (c + d) + a) * (h + g).
B) What is the algorithm of Binary Search and Linear Search and also show the
results of the both of the search on given series to find the digit 100 in it.
7
Series : 3, 10, 1, 613, 19, 100, 61, 35, 98, 13, 89, 77, 6, 55, 103.
7. Answer the following :
A) What do you mean by Tree ? State and explain Breadth and Depth First search
as a classical tree traversing algorithm with suitable example.
7
B) What is the Dijkstra’s algorithm ? Discuss how it will be useful for visiting all
nodes shown in graph while not visiting each node twice but at least once.
7
_____________________
SLR-CK – 5
*SLRCK5*
Seat
No.
M.Sc. – I (Semester – I) Examination, 2014
COMPUTER SCIENCE (Old)
Object Oriented Programming Using C++ (Paper – I)
Day and Date : Friday, 14-11-2014
Time : 11.00 a.m. to 2.00 p.m.
Max. Marks : 70
Instructions : 1) Question No. 1 and 2 are compulsory.
2) Attempt any three questions from Q. No. 3 to Q. No. 7.
3) Figures to the right indicate full marks.
1. A) Choose correct alternatives:
10
1) Which of the following header file includes definition of cin and cout ?
A) istream.h
B) ostream.h
C) iomanip.h
D) iostream.h
2) Which of the following provides a reuse mechanism ?
A) Abstraction
B) Inheritance
C) Dynamic binding
D) Encapsulation
3) A constructor that accepts ________________ parameters is called the default
constructor.
A) One
B) Two
C) Three
D) No
4) Destructor has the same name as the constructor and it is preceded by
________________
A) ~
B) |
C) ?
D) $
5) Array indexing always starts with the number
A) 1
B) 0
C) 2
D) – 1
P.T.O.
SLR-CK – 5
*SLRCK5*
-2-
6) Setprecision requires the header file ________________
A) stdlib.h
B) iomanip.h
C) console.h
D) conio.h
7) Which of the following is user defined data type ?
A) Public
B) Private
C) Class
D) Both A) and B)
8) The static member variable is initialized to _____________
A) 0
B) 1
C) 2
D) 3
9) The mechanism that binds code and data together and keeps them secure
from outside world is known as ________________
A) Abstraction
B) Encapsulation
C) Inheritance
D) Polymorphism
10) What does your class can hold ?
A) Data
B) Function
C) Both A) and B)
D) None of these
B) State whether following statements are True or False :
4
1) An inline function is a function that is expanded in line when it is invoked.
2) We cannot have virtual constructors, but we can have virtual destructors.
3) In operator overloading, we can change the basic meaning of an operator.
4) A destructor is used to destroy the object that have been created by
constructor.
2. A) Write a short note on following :
8
i) Function overloading
ii) Inline function.
B) Answer the following :
i) Define flowchart. Explain different symbols used in flowchart.
ii) Explain primary data types used in C++.
6
*SLRCK5*
-3-
SLR-CK – 5
3. Answer the following :
A) What is manipulator ? Explain the use of width ( ), precision and fill ( )
manipulators.
7
B) What is arrays of objects ? Explain with example.
7
4. Answer the following :
A) Write a program in C++ to study parameterized constructor.
7
B) What is template ? Explain class template.
7
5. Answer the following :
A) Write a C++ program to implement multilevel inheritance.
7
B) What do you mean by operator overloading ? Explain with suitable example.
7
6. Answer the following :
A) What is virtual function ? Explain characteristics of virtual functions.
7
B) Explain various concepts of object oriented programming.
7
7. Answer the following :
A) Define a file. Explain I/O commands in file handling.
7
B) Explain call by reference and return by reference with example.
7
––––––––––––––––––––
SLR-CK – 6
*SLRCK6*
Seat
No.
M.Sc. – I (Semester – I) Examination, 2014
COMPUTER SCIENCE (Old)
Paper – II : Numerical Analysis
Day and Date : Monday, 17-11-2014
Time : 11.00 a.m. to 2.00 p.m.
Instructions : i)
ii)
iii)
iv)
Max. Marks : 70
Question No. 1 and 2 are compulsory.
Attempt any three questions from Q. No. 3 to Q. No. 7.
Figures to the right indicate full marks.
Use of simple or scientific calculator is allowed.
1. A) Select most correct alternative.
10
i) The next iterative value of the root of x2 – 4 = 0 using Newton-Raphson
method, if the initial guess is 3, is
a) 1.5
b) 2.067
c) 2.167
d) 3.000
ii) The number 02.56 × 104 has __________ significant digits.
a) 3
b) 4
c) 5
d) 6
⎡6 2 3 ⎤
iii) Given A = ⎢⎢0 1 2⎥⎥ then A is ____________ matrix.
⎢⎣0 0 6⎥⎦
a) a diagonal
b) an identity
c) an upper triangular
d) a lower triangular
iv) The truncation error in calculating f ′(2 ) for f(x) = x2 by f ′(x ) ≈
f (x + h) − f (x )
h
with h = 0.2 is
a) –0.2
b) 0.2
c) 4
d) 4.2
v) In composite Trapezoidal rule the number of segments n must be
a) any positive integer
b) an odd number
c) an even number
d) multiple of 3
P.T.O.
SLR-CK – 6
*SLRCK6*
-2-
vi) (y ′′′)2 + 5 y ′ = 0 is a ___________ differential equation.
a) first-degree, third-order
b) third-degree, second-order
c) third-degree, first-order
d) second-degree, third-order
vii) The finite difference y1 – y0, where yi = f(xi), is denoted by
a) Δy 0
b) ∇y 0
c) δy 3 2
d) None of these
viii) If p(x) = a0 + a1x, p(100) = 3/7 and p(101) = – 4/7 then a0 = __________
(approximately).
a) 101.4
b) –101.4
c) 100.4
d) 100
ix) The techniques and methods for solving systems of linear algebraic
equations belong to
a) elimination approach
b) iterative approach
c) a) and b)
d) neither a) nor b)
x) The system of equations : 6x – 3y = 8, 2x – y = 5 has
a) no solution
b) unique solution
c) two solutions
d) many solutions
B) Fill in the blanks :
4
i) The general solution of the differential equation y ′ = ae x is _________
ii) The three point Newton-cotes formula is __________ rule.
iii) For the function x2 – 4x – 10 = 0 with initial estimates of x1 = 1 and x2 = 4,
by using secant method the next estimate x3 will be __________
iv) If x0 = 4, x1 = 2 and f0 = 20, f1 = 10 then the first divided difference
f[x 0 , x 1 ] = _________
2. A) i) Define an absolute error. Three approximate values of the number 2/3 are
given as 0.60, 0.66 and 0.67. Verify which of these three is the best
approximation.
ii) Define the operators Δ, ∇ and E . Show that E −1Δ ≡ ∇ .
B) i) State mean-value theorem for derivatives.
ii) State the Newton’s general interpolation formula.
4
4
3
3
*SLRCK6*
SLR-CK – 6
-3-
3. A) Describe Gauss-Seidel method.
7
B) Find the value of 7 by using Newton-Raphson method and compare it with
the value generated on calculator.
4. A) Explain Lagrange’s interpolation formula.
7
7
B) Solve the following system of equations by using Gauss elimination method.
3x1 + 6x2 + x3 = 16
2x1 + 4x2 + 3x3 = 13
x1 + 3x2 + 2x3 = 9
7
5. A) Write an algorithm of finding the root of f(x) = 0 by regula falsi method.
B) From the following table, find the area bounded by the curve f(x) and the
x-axis from x = 7.47 to x = 7.52 by using suitable rule.
x
7.47
7.48
7.49
7.50
7.51
7.52
y = f(x)
1.93
1.95
1.98
2.01
2.03
2.06
6. A) Describe Simpson’s 1 rule.
3
7
7
7
B) Given the following information :
x
1
3
7
8
y = f(x)
0
1.0986
1.9459
2.0794
Find f(5) by using Newton’s general interpolation formula.
7. A) Given the equation
using h = 0.1.
dy
= xy with y(0) = 1. Estimate y(0.4) by Euler’s method
dx
7
7
B) Given the following information :
x
y = f(x)
1
3
5
7
101
109
125
149
Find f(2.5) by using Newton’s forward difference interpolation formula.
_____________________
7
SLR-CK – 7
*SLRCK7*
Seat
No.
M.Sc. – I (Semester – I) Examination, 2014
COMPUTER SCIENCE
Software Engineering (Paper – III) (Old)
Day and Date : Wednesday, 19-11-2014
Time : 11.00 a.m. to 2.00 p.m.
Total Marks : 70
Instructions : 1) Question No. 1 and 2 are compulsory.
2) Attempt any three questions from Q. 3 to Q. 7.
3) Figures to the right indicates full marks.
1. A) Choose correct alternative :
10
1) The model in which the requirements are implemented by category is
______________
A) Evolutionary Development Model
B) Waterfall Model
C) Prototyping
D) Iterative Enhancement Model
2) The following can be considered to quality
A) Customer Satisfaction
B) Defects
C) Rework
D) All of these
3) The level at which the software uses scarce resources is
A) Reliability
B) Efficiency
C) Portability
D) All of the above
4) What types of models are created during software requirements analysis ?
A) Functional and behavioral
B) Algorithmic and data structure
C) Architectural and structural
D) Usability and reliability
5) Requirements can be refined using
A) The waterfall model
B) Prototyping model
C) The evolutionary model
D) The spiral model
P.T.O.
SLR-CK – 7
-2-
*SLRCK7*
6) Structured charts are a product of
A) Requirements gathering
B) Requirements analysis
C) Design
D) Coding
7) If a program in its functioning has not met user requirements in some
way, then it is
A) an error
B) a failure
C) a fault
D) a defect
8) Which phase is not available in classic life cycle ?
A) Coding
B) Testing
C) Maintenance
D) Abstraction
9) Which is not a step of requirement engineering ?
A) Requirements elicitation
B) Requirements analysis
C) Requirements design
D) Requirements documentation
10) Pick odd man out.
A) Waterfall
B) RAD
C) Prototype
D) Design
B) State True or False :
1) Software deteriorates rather than wears out because defects are more
likely to arise after software has been used often.
2) Definition, development and support are the three generic phases of
software engineering.
3) A key concept of quality control is that all work products have measurable
specification for process outputs.
4) Software process is a Coherent set of activities for specifying, designing,
implementing and testing software systems.
4
*SLRCK7*
-3-
SLR-CK – 7
2. A) Write short notes on the following :
8
i) Software characteristics.
ii) Software Quality Assurance.
B) Answer the following :
6
i) State the problems of prototyping.
ii) State any three differences between Black box testing and White box
testing.
3. Answer the following :
14
A) Explain the analysis principles in detail.
B) Explain the Architectural design in detail.
4. Answer the following :
14
A) What is testing ? Explain the software testing strategies.
B) Explain the User Interface Design with help of example.
5. Answer the following :
14
A) Explain the metric in process and project domains.
B) Explain the control structure testing with example.
6. Answer the following :
14
A) Explain the Object Oriented Design in detail.
B) Explain the mechanics of structured analysis in detail.
7. Answer the following :
14
A) Explain the different phases involved in waterfall life cycle.
B) Explain the functional and behavioral modeling in detail.
_____________________
SLR-CK – 8
*SLRCK8*
Seat
No.
M.Sc. – I (Semester – I) Examination, 2014
COMPUTER SCIENCE
Paper – IV : Data Structures (Old)
Day and Date : Friday, 21-11-2014
Time : 11.00 a.m. to 2.00 p.m.
Max. Marks : 70
Instructions : 1) Question No. 1 and 2 are compulsory.
2) Attempt any three questions Q. No. 3 to Q. No. 7.
3) Figures to right indicate full marks.
1. A) Choose correct alternatives :
10
i) The prefix form of the expression A/B/C is __________
a) /A/BC
b) /AB/C
c) //ABC
d) /ABC/
ii) Some edges in the graph are directed and some are undirected such a
graph is called as __________
a) Multi directed graph
b) Mixed graph
c) Multigraph
d) All of above
iii) The memory address of the first element of an array is called
a) floor address
b) foundation address
c) first address
d) base address
iv) When new data are to be inserted into a data structure, but there is no
available space; this situation is usually called
a) underflow
c) housefull
b) overflow
d) saturated
v) The term “push” and “pop” is related to the
a) array
c) stacks
b) lists
d) all of above
P.T.O.
SLR-CK – 8
*SLRCK8*
-2-
vi) On which principle does stack work ?
a) FOLI
b) FIFO
c) LILO
d) LIFO
vii) Which sorting technique is best performer in all the cases ?
a) Selection sort
c) Both (a) and (b)
b) Heap sort
d) None of the above
viii) Which order is not used in traversing of tree ?
a) Root, Left, Right
b) Left, Root, Right
c) Left, Right, Root
d) Right, Left, Root
ix) In which linked list, last node is pointing towards first node ?
a) Circular list
b) Doubly linked list
c) Header linked list
d) One way list
x) Breadth First Search is used in
a) Binary Search Tree
b) Graph
c) Stack
d) Queue
B) True/False :
4
i) Linked list is implemented using arrays
ii) Can stack is described as pointer
iii) A tree contains cycle
iv) Tree is linear data structure.
2. A) Write short notes on following :
8
1) Analysis of algorithm
2) Priority queue.
B) Answer the following :
i) What are the properties of list structure ? Explain.
ii) Explain recursion.
6
*SLRCK8*
-3-
SLR-CK – 8
3. A) What is hashing ? Explain hashing technique in detail.
14
B) Explain different types of arrays in detail.
4. A) Explain any one application of linked list with example.
14
B) What is graph ? Give adjacency matrix and path matrix for following graph.
5. A) Write C/C++ program to perform various operations on stack.
14
B) Explain applications of queue.
6. A) What is searching ? Explain linear search technique with example.
14
B) Write an algorithm to add new data at the end of doubly linked list.
7. A) Explain different way of traversing a binary tree with suitable example.
B) Write an algorithm for bubble sort method.
_____________________
14
SLR-CK – 9
*SLR-CK-9*
Seat
No.
M.Sc. – I (Semester – II) Examination, 2014
COMPUTER SCIENCE
Operations Research (Paper – V)
Day and Date : Saturday, 15-11-2014
Time : 11.00 a.m. to 2.00 p.m.
Instructions : 1)
2)
3)
4)
Max. Marks : 70
Attempt any five questions.
Q. No. 1 and Q. No. 2 are compulsory.
Attempt any three from Q. No. 3 to Q. No. 7.
Figures to the right indicate full marks.
1. A) Choose correct alternative (one mark each) :
7
1) A simplex in two dimension is ______________
a) line
b) triangle
c) point
d) tetrahedron
2) The boundary points of a convex set are always ______________
a) Extreme points
b) Interior points
c) Not extreme points
d) None of these
3) A quadratic form Q(X) is positive definite iff
a) XTQX > 0
b) XTQX ≥ 0
c) XTQX < 0
d) XTQX ≤ 0
4) While finding dual of any primal form, all constraints must be in
______________ form.
a) ≤
b) ≥
c) =
d) Any of these
5) If the primal problem has unbounded solution, then the dual problem will
have ______________ solution.
a) Finite solution
b) Feasible solution
c) No feasible solution
d) Optimum solution
P.T.O.
SLR-CK – 9
*SLR-CK-9*
-2-
6) Dual simplex method is applicable to those LPPs that start with
a) an infeasible solution
b) an infeasible but optimum solution
c) a feasible solution
d) a feasible and optimum solution.
7) The set C containing only single point is ______________
a) concave
b) convex
c) convex hull
d) convex polyhedron
B) Fill in the blanks (one mark each) :
7
1) If X is just eight vertices of a cube then the convex hull C(X) is
______________
2) The element at the intersection of outgoing vector and incoming vector is
called ______________
3) If CX = Z defines hyperplane, for optimum value of Z this hyperplane is
called ______________
4) The simplex is an n-dimensional convex polyhedron having exactly
______________ vertices.
5) Constructing a Gomory’s constraints will mean geometrically that
“______________”
6) The net evaluations ( Δ j’ s) corresponding to unit column vectors are
always ______________
7) Every point on the circumference of the circle is ______________
2. a) Define :
3
i) Feasible solution
ii) Basic solution
iii) Basic feasible solution.
b) P.T. A hyperplane in Rn is a convex set.
4
*SLR-CK-9*
-3-
SLR-CK – 9
c) Obtain the dual of following problem
Min z = 2x1 + 3x2 + 4x3
Subject to the constraints,
2x1 + 3x2 + 5x3 ≥ 2
3x1 + x2 + 7x3 = 3
x1 + 4x2 + 6x3 ≤ 5, x1, x2, x3 ≥ 0.
3
d) State the formulas for finding the outgoing and incoming vector in dual simplex
method.
4
3. a) Solve by simplex method
Max z = 3x1 + 2x2
Subject to the constraints,
x1 + x2 ≤ 4
x1 – x2 ≤ 2 and x1, x2 ≥ 0.
b) Give the algorithm of Dual simplex method.
7
7
4. a) P.T. the collection of all feasible solutions to L.P. problem constitute a convex
set whose extreme points correspond to the basic feasible solution.
7
b) Solve the following LPP by using Big-M method.
Max. Z = – 2x1 – x2
Subject to the constraints,
3x1 + x2 = 3, 4x1 + 3x2 ≥ 6
x1 + 2x2 ≤ 4
and x1, x2 ≥ 0.
7
SLR-CK – 9
-4-
*SLR-CK-9*
5. a) If the kth constraint of the primal is an equality then prove that the dual
variable Wk is unrestricted in sign.
b) The pay off matrix of a game is given. Find the solution of the game to player
A and B.
B
III
0
1
I II
IV V
5
3
I ⎡− 2 0
⎢
3 2
2
2
II
A ⎢
0 −2
6
III ⎢− 4 − 3
⎢
2 −6
IV ⎣ 5 3 − 4
7
7
⎤
⎥
⎥
⎥
⎥
⎦
6. a) Construct the Kuhn-Tucker conditions for solving a quadratic programming
problem.
7
b) Give the algorithm of Beale’s method to solve a quadratic programming
problem.
7
7. a) Find the optimum integer solution to the following LPP.
Max z = x1 + 2x2
Subject to the constraints,
2x2 ≤ 7
x1 + x2 ≤ 7
2x1 ≤ 11
and x1, x2 ≥ 0 and are integers.
b) Give the computational procedure of finding the solution to LPP by Dual simplex
method.
_____________________
8
6
Download